2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) 2008
DOI: 10.1109/percom.2008.23
|View full text |Cite
|
Sign up to set email alerts
|

Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems

Abstract: In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protection method proposed by Choi and Roh in [1], which serves to protect the unique identifier of an RFID tag from disclosure to close-range eavesdroppers. Choi and Roh's method faces the 'same-bit' problem, in which some bits of the unique identifier could be disclosed, thereby revealing critical information. Our proposed scheme alleviat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…Lim et al [18] introduce a randomized bit encoding scheme (RBE) which is able to alleviate the same bit problem of the technique in [3]. In RBE, each bit of a real tag ID is encoded into an n-bit string and a tag sends its encoded ID to a reader under the privacy masking protocol.…”
Section: Privacy Protection In Rfid Singulationmentioning
confidence: 99%
See 4 more Smart Citations
“…Lim et al [18] introduce a randomized bit encoding scheme (RBE) which is able to alleviate the same bit problem of the technique in [3]. In RBE, each bit of a real tag ID is encoded into an n-bit string and a tag sends its encoded ID to a reader under the privacy masking protocol.…”
Section: Privacy Protection In Rfid Singulationmentioning
confidence: 99%
“…In this paper, we adopt the architecture in [18] and assume the deployment of TMDs. In addition, we assume that each tag takes part in the singulation process with a randomly generated pseudo ID.…”
Section: System Designmentioning
confidence: 99%
See 3 more Smart Citations